Skip to content

Commit d5d82da

Browse files
authored
Merge pull request #108360 from asudbring/lbpatch
Fixed note
2 parents b3dcf7a + e290b80 commit d5d82da

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/load-balancer/concepts-limitations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: allensu
1616

1717
---
1818
# Load Balancer components and limitations
19-
Azure Load Balancer contains several key components for it's operation. These components can be configured in your subscription via the Azure portal, Azure CLI, or Azure PowerShell.
19+
Azure Load Balancer contains several key components for its operation. These components can be configured in your subscription via the Azure portal, Azure CLI, or Azure PowerShell.
2020

2121
## Load Balancer components
2222

@@ -86,9 +86,9 @@ The following image displays the hash-based distribution:
8686
* Easy upgrade and disaster recovery of services, because the front end can be dynamically mapped to another instance of the service.
8787
* Easier access control list (ACL) management. ACLs expressed as front-end IPs don't change as services scale up or down or get redeployed. Translating outbound connections to a smaller number of IP addresses than machines reduces the burden of implementing safe recipient lists.
8888

89-
Standard Load Balancer utilizes a [robust, scalable, and predictable SNAT algorithm](load-balancer-outbound-connections.md#snat).These are the key tenets to remember when working with Standard Load Balancer:
89+
Standard Load Balancer utilizes a [robust, scalable, and predictable SNAT algorithm](load-balancer-outbound-connections.md#snat). These are the key tenets to remember when working with Standard Load Balancer:
9090

91-
- load-balancing rules infer how SNAT is programmed. Load balancing rules are protocol specific. SNAT is protocol specific and configuration should reflect this rather than create a side effect.
91+
- load-balancing rules infer how SNAT is programmed. Load balancing rules are protocol-specific. SNAT is protocol-specific and configuration should reflect this rather than create a side effect.
9292

9393
- **Multiple frontends**
9494
When multiple frontends are available, all frontends are used and each frontend multiplies the number of available SNAT ports. If you want more SNAT ports because you are expecting or are already experiencing a high demand for outbound connections, you can also add incremental SNAT port inventory by configuring additional frontends, rules, and backend pools to the same virtual machine resources.
@@ -97,13 +97,13 @@ The following image displays the hash-based distribution:
9797
You can choose and control if you do not wish for a particular frontend to be used for outbound connections. If you want to constrain outbound connections to only originate from a specific frontend IP address, you can optionally disable outbound SNAT on the rule that expresses the outbound mapping.
9898

9999
- **Control outbound connectivity**
100-
outbound scenarios are explicit and outbound connectivity does not exist until it has been specified. Standard Load Balancer exists within the context of the virtual network. A virtual network is an isolated, private network. Unless an association with a public IP address exists, public connectivity is not allowed. You can reach [VNet Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md) because they are inside of and local to your virtual network. If you want to establish outbound connectivity to a destination outside of your virtual network, you have two options:
100+
outbound scenarios are explicit and outbound connectivity does not exist until it has been specified. Standard Load Balancer exists within the context of the virtual network. A virtual network is an isolated, private network. Unless an association with a public IP address exists, public connectivity is not allowed. You can reach [Virtual Network Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md) because they are inside of and local to your virtual network. If you want to establish outbound connectivity to a destination outside of your virtual network, you have two options:
101101
- assign a Standard SKU public IP address as an Instance-Level Public IP address to the virtual machine resource or
102102
- place the virtual machine resource in the backend pool of a public Standard Load Balancer.
103103

104104
Both will allow outbound connectivity from the virtual network to outside of the virtual network.
105105

106-
If you _only_ have an internal Standard Load Balancer associated with the backend pool in which your virtual machine resource is located, your virtual machine can only reach virtual network resources and [VNet Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md). You can follow the steps described in the preceding paragraph to create outbound connectivity.
106+
If you _only_ have an internal Standard Load Balancer associated with the backend pool in which your virtual machine resource is located, your virtual machine can only reach virtual network resources and [Virtual Network Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md). You can follow the steps described in the preceding paragraph to create outbound connectivity.
107107

108108
Outbound connectivity of a virtual machine resource not associated with Standard SKUs remains as before.
109109

articles/load-balancer/load-balancer-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ An **[internal (or private) load balancer](./concepts-limitations.md#internalloa
3636
For more information on the individual load balancer components, see [Azure Load Balancer components and limitations](./concepts-limitations.md)
3737

3838
>[!NOTE]
39-
> Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you need high-performance, low-latency, Layer-4 load balancing, see [What is Azure Application Gateway?](../application-gateway/overview.md) If you're looking for global DNS load balancing, see [What is Traffic Manager?](../traffic-manager/traffic-manager-overview.md) Your end-to-end scenarios may benefit from combining these solutions.
39+
> Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you need high-performance, low-latency, Layer-7 load balancing, see [What is Azure Application Gateway?](../application-gateway/overview.md) If you're looking for global DNS load balancing, see [What is Traffic Manager?](../traffic-manager/traffic-manager-overview.md) Your end-to-end scenarios may benefit from combining these solutions.
4040
>
4141
> For an Azure load-balancing options comparison, see [Overview of load-balancing options in Azure](https://docs.microsoft.com/azure/architecture/guide/technology-choices/load-balancing-overview).
4242

0 commit comments

Comments
 (0)